cve-2021-45046
Here are 27 public repositories matching this topic...
A simple and fast Maven dependency vulnerability scanner. Check existence of vuln JARs (transitive)
-
Updated
Jun 3, 2024 - Java
Scanner that scans local files for log4shell vulnerability. Does bytecode analysis so it does not rely on metadata. Will find vulnerable log4j even it has been self-compiled/repackaged/shaded/nested (e.g. uberjar, fatjar) and even obfuscated.
-
Updated
Jun 5, 2024 - Java
Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046
-
Updated
Apr 7, 2024 - Go
Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.
-
Updated
Jun 21, 2023 - Python
Log4j Vulnerability Scanner for Windows
-
Updated
Mar 22, 2023 - C
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
-
Updated
Dec 27, 2022 - Python
log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
-
Updated
Dec 6, 2022 - Java
Scans the file system to find Log4Shell vulnerabilities.
-
Updated
Sep 26, 2022 - Rust
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
-
Updated
Jun 15, 2022 - Python
Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
-
Updated
May 26, 2022 - Python
Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
-
Updated
Apr 7, 2022 - Java
A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC
-
Updated
Mar 10, 2022 - Java
Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detect vulnerable log4j versions on your local file-system
-
Updated
Feb 15, 2022 - Go
CVE-log4j CheckMK plugin
-
Updated
Feb 14, 2022 - Python
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
-
Updated
Jan 15, 2022 - Java
Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files
-
Updated
Jan 5, 2022 - Go
Public testing data. Samples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC
-
Updated
Dec 30, 2021
PowerShell script to Remove JndiLookup.class from Jar-files to remediate LOG4J Vulnerability uses built-in compression library of Windows.
-
Updated
Dec 28, 2021 - PowerShell
Script to combine all host specific json outputs from log4j-detector into one single csv file. Requires only standard python installation, no further dependencies.
-
Updated
Dec 27, 2021 - Python
Improve this page
Add a description, image, and links to the cve-2021-45046 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cve-2021-45046 topic, visit your repo's landing page and select "manage topics."